Table of Contents
|
Data and Applications Security and Privacy XXXII Florian Kerschbaum, Stefano Paraboschi |
Front Matter |
Administration
|
Modeling and Mitigating the Insider Threat of Remote Administrators in Clouds Nawaf Alhebaishi, Lingyu Wang, Sushil Jajodia, Anoop Singhal |
3-20 |
Blockchain-Based Auditing of Transparent Log Servers Hoang-Long Nguyen, Jean-Philippe Eisenbarth, Claudia-Lavinia Ignat, Olivier Perrin |
21-37 |
Probabilistic Event Graph to Model Safety and Security for Diagnosis Purposes Edwin Bourget, Frédéric Cuppens, Nora Cuppens-Boulahia, Samuel Dubus, Simon Foley, Youssef Laarouchi |
38-47 |
Access Control Policies
|
Enabling the Deployment of ABAC Policies in RBAC Systems Gunjan Batra, Vijayalakshmi Atluri, Jaideep Vaidya, Shamik Sural |
51-68 |
Policy Languages and Their Suitability for Trust Negotiation Martin Kolar, Carmen Fernandez-Gago, Javier Lopez |
69-84 |
Role of Apps in Undoing of Privacy Policies on Facebook Vishwas Patil, Nivia Jatain, R. Shyamasundar |
85-98 |
Towards Adaptive Access Control Luciano Argento, Andrea Margheri, Federica Paci, Vladimiro Sassone, Nicola Zannone |
99-109 |
Privacy-Preserving Access and Computation
|
Oblivious Dynamic Searchable Encryption on Distributed Cloud Systems Thang Hoang, Attila Yavuz, F. Durak, Jorge Guajardo |
113-130 |
Privacy-Preserving Planarity Testing of Distributed Graphs Guy Barshap, Tamir Tassa |
131-147 |
Image Pixelization with Differential Privacy Liyue Fan |
148-162 |
Integrity and User Interaction
|
Data Integrity Verification in Column-Oriented NoSQL Databases Grisha Weintraub, Ehud Gudes |
165-181 |
A Novel Hybrid Password Authentication Scheme Based on Text and Image Ian Mackie, Merve Yıldırım |
182-197 |
“It’s Shocking!": Analysing the Impact and Reactions to the A3: Android Apps Behaviour Analyser Majid Hatamian, Agnieszka Kitkowska, Jana Korunovska, Sabrina Kirrane |
198-215 |
Security Analysis and Private Evaluation
|
FlowConSEAL: Automatic Flow Consistency Analysis of SEAndroid and SELinux Policies B. Radhika, N. Narendra Kumar, R. Shyamasundar |
219-231 |
On Understanding Permission Usage Contextuality in Android Apps Md Hossen, Mohammad Mannan |
232-242 |
Private yet Efficient Decision Tree Evaluation Marc Joye, Fariborz Salehi |
243-259 |
Fixing Vulnerabilities
|
Breaking and Fixing the Security Proof of Garbled Bloom Filters Cédric Rompay, Melek Önen |
263-277 |
USBlock: Blocking USB-Based Keypress Injection Attacks Sebastian Neuner, Artemios Voyiatzis, Spiros Fotopoulos, Collin Mulliner, Edgar Weippl |
278-295 |
Networked Systems
|
Virtually Isolated Network: A Hybrid Network to Achieve High Level Security Jia Xu, Jianying Zhou |
299-311 |
Fingerprinting Crowd Events in Content Delivery Networks: A Semi-supervised Methodology Amine Boukhtouta, Makan Pourzandi, Richard Brunner, Stéphane Dault |
312-329 |
Assessing Attack Impact on Business Processes by Interconnecting Attack Graphs and Entity Dependency Graphs Chen Cao, Lun-Pin Yuan, Anoop Singhal, Peng Liu, Xiaoyan Sun, Sencun Zhu |
330-348 |